通信專業(yè)英語論文_第1頁
通信專業(yè)英語論文_第2頁
通信專業(yè)英語論文_第3頁
通信專業(yè)英語論文_第4頁
通信專業(yè)英語論文_第5頁
已閱讀5頁,還剩16頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領

文檔簡介

1、 專業(yè)英語 題 目 M2M移動通信網(wǎng)絡構架研究 學生姓名 學 號 學 院 專 業(yè) 通信工程指導教師 二一 年 月 日I摘 要 文章對M2M業(yè)務特征和MTC通信網(wǎng)絡架構進行了探討。首先詳細分析M2M業(yè)務特征以及對現(xiàn)網(wǎng)架構的影響;然后借鑒國際標準組織提出的M2M網(wǎng)絡架構,并在此基礎上根據(jù)現(xiàn)階段的網(wǎng)絡現(xiàn)狀和M2M業(yè)務需求提出了3G網(wǎng)絡階段適用的網(wǎng)絡架構?!娟P鍵詞】M2M 網(wǎng)絡架構 PCRF 核心網(wǎng) 專用網(wǎng)元1 引言物物通信(M2M,Machine to Machine)是一種涉及一個或多個實體的不需要人為干預的數(shù)據(jù)通信,也稱為機器類型通信(MTC,Machine-Type Communication

2、)。隨著M2M業(yè)務的快速發(fā)展,基于移動通信網(wǎng)絡的MTC正日益成為一種主要的移動通信方式,但是傳統(tǒng)移動通信網(wǎng)絡畢竟是面向人人通信(H2H,Hu-man to human)業(yè)務設計的,適應H2H的業(yè)務需求,卻不能滿足M2M業(yè)務需求。具體來說,MTC和傳統(tǒng)人人通信的不同之處包括以下方面1:(1)基于MTC通信的應用場景比H2H通信的場景豐富很多,而且具有差異性。根據(jù)功能特性劃分大致可歸納為位置感知和共享、環(huán)境信息感知、遠程控制與執(zhí)行、數(shù)據(jù)收集發(fā)布、視頻監(jiān)控、近場通信等。這些應用的差異化一方面表現(xiàn)為功能上的多樣性;另一方面也體現(xiàn)在應用特征以及對網(wǎng)絡的需求上的差異化。(2)數(shù)據(jù)通信為主,包括小流量數(shù)據(jù)包

3、、視頻流等。(3)要求MTC通信成本比H2H更低。由于M2M業(yè)務是在H2H業(yè)務之后發(fā)展起來的,最小化成本是M2M業(yè)務生存的重要考慮。不同的應用因其重要性不同,對通信的要求也是不同的,需要結合事件發(fā)生的可能性和需要付出的通信等綜合成本來考慮進行成本的最小化。(4)M2M終端數(shù)目巨大,需要更靈活和有策略的終端管理。潛在的海量M2M終端接入通信網(wǎng)絡,而且M2M終端無論是從傳輸特性、QoS要求和移動性,還是從終端的分布密度方面,都與H2H終端有很大不同。(5)以小數(shù)據(jù)量傳輸為主。如果繼續(xù)使用傳統(tǒng)移動通信系統(tǒng)來進行MTC通信,其系統(tǒng)的效率、成本和適用性都無法達到最優(yōu)。因此,在考慮M2M業(yè)務特征的同時減少

4、對H2H業(yè)務的影響,從而設計MTC專用的通信系統(tǒng),是當前物物通信不斷發(fā)展背景下的一個重要課題。2 M2M業(yè)務特征分析網(wǎng)絡架構的設計,需要以網(wǎng)絡所承載的具體業(yè)務為出發(fā)點2。也就是說,M2M網(wǎng)絡架構的設計需要充分分析M2M業(yè)務特征和需求,結合終端上下行數(shù)據(jù)量、頻度、QoS需求等方面的業(yè)務特征,將物聯(lián)網(wǎng)應用分為如下五類。其中,對各類應用的部分需求和特征進行了分析,包括移動性、群組通信、鑒權以及按計劃周期性處理等,不同場景間有較大差異。(1)監(jiān)控報警類:傳感器本地監(jiān)測數(shù)據(jù),當發(fā)生不符合預期的數(shù)據(jù)變化時通過網(wǎng)絡通知應用層進行報警。平均數(shù)據(jù)傳輸速率:低,僅在某些觸發(fā)條件下發(fā)送少量上行數(shù)據(jù)流量。尖峰數(shù)據(jù)傳輸

5、速率:不同場景間有較大差異,與應用需求確定的傳輸?shù)臄?shù)據(jù)內(nèi)容有關。QoS要求:不同場景間有較大差異,與應用需求以及當前數(shù)據(jù)所代表的含義有關。數(shù)據(jù)安全要求:不同場景間有較大差異,與應用需求有關。數(shù)據(jù)可靠傳遞要求:不同場景間有較大差異,與應用需求有關。數(shù)據(jù)持續(xù)性:低,僅在發(fā)生預置的事件時存在短暫的或者持續(xù)時間較短的數(shù)據(jù)傳輸。與人交互性:低,通常由系統(tǒng)根據(jù)預置處理方式自動處理。對連接性的需求:需要監(jiān)控連接性以防破壞或無效。終端移動性:因無下行流量需求,所以無移動性需求。舉例:輸血車血液環(huán)境監(jiān)測;井蓋監(jiān)控;移動資產(chǎn)跟蹤。(2)數(shù)據(jù)收集類平均數(shù)據(jù)傳輸速率上行流量:中,數(shù)據(jù)量較大,持續(xù)的數(shù)據(jù)上報或者周期性數(shù)

6、據(jù)上報;下行流量:低,更多的是用于修改上報規(guī)則等。尖峰數(shù)據(jù)傳輸速率:不同場景間有較大差異,與應用需求確定的傳輸?shù)臄?shù)據(jù)內(nèi)容有關。QoS要求:不同場景間有較大差異,與應用需求以及當前數(shù)據(jù)所代表的含義有關。數(shù)據(jù)安全要求:不同場景間有較大差異,與應用需求有關。數(shù)據(jù)可靠傳遞要求:不同場景間有較大差異,與應用需求有關。數(shù)據(jù)持續(xù)性:取決于數(shù)據(jù)傳輸間隔和傳輸方式的選擇。論文網(wǎng)與人交互性:低,通常由系統(tǒng)根據(jù)預置處理方式自動處理。對連接性的需求:需要監(jiān)控連接性以防破壞或無效。終端移動性:因偶爾有下行數(shù)據(jù),所以需要優(yōu)化的移動性管理。舉例:氣象信息監(jiān)測;火災現(xiàn)場數(shù)據(jù)收集;路況信息收集。(3)信息推送類平均數(shù)據(jù)傳輸速率

7、上行流量:通常較低,主要用于提供應用所需的過濾或輸入條件(如位置信息);下行流量:通常較大,主要用于傳遞所推送的信息(如廣告、視頻媒體等),持續(xù)的、基于交互等外界條件出發(fā)的或者周期性的數(shù)據(jù)推送。尖峰數(shù)據(jù)傳輸速率:具有明顯的尖峰數(shù)據(jù)特征,在條件觸發(fā)后下發(fā)匹配的信息。QoS要求:不同場景間有較大差異,與應用需求以及當前數(shù)據(jù)所代表的含義有關。數(shù)據(jù)安全要求:不同場景間有較大差異,與應用需求有關。數(shù)據(jù)可靠傳遞要求:不同場景間有較大差異,與應用需求有關。數(shù)據(jù)持續(xù)性:通常具有較長時間的持續(xù)性。與人交互性:高,通常用戶會做出反饋,系統(tǒng)根據(jù)反饋對推送的信息進行調(diào)整。對連接性的需求:較強,需要維護網(wǎng)絡連接以便于進

8、行數(shù)據(jù)的正確傳輸。終端移動性:兩極分化。部分終端有很強的移動性;部分終端則通常不移動。舉例:智能博物館等。(4)視頻監(jiān)控類平均數(shù)據(jù)傳輸速率上行流量:高,主要用于傳遞所監(jiān)控的多媒體數(shù)據(jù);下行流量:低,主要用于傳遞控制和調(diào)節(jié)命令等。尖峰數(shù)據(jù)傳輸速率:無明顯的尖峰數(shù)據(jù)特征,數(shù)據(jù)傳輸通常維持一個相對穩(wěn)定的傳輸速率。QoS要求:不同場景間有較大差異,與應用需求有關。數(shù)據(jù)安全要求:不同場景間有較大差異,與應用需求有關。數(shù)據(jù)可靠傳遞要求:不同時刻有不同的要求。如在正常情況下要求適中,但一旦發(fā)生某些預置的事件則需要較高的可靠性傳遞。數(shù)據(jù)持續(xù)性:通常具有長時間的持續(xù)性。與人交互性:低,用戶偶爾會對視頻監(jiān)控過程進

9、行干預。對連接性的需求:較強,需要維護網(wǎng)絡連接以便于進行數(shù)據(jù)的正確傳輸。終端移動性:兩極分化。部分終端有很強的移動性;部分終端則通常不移動。舉例:家庭安防中的視頻監(jiān)控等。(5)遠程控制執(zhí)行器類平均數(shù)據(jù)傳輸速率上行流量:通常較低,主要用于提供應用所需的過濾或輸入條件(如預置事件的發(fā)生);下行流量:取決于控制對象和控制命令的復雜程度。尖峰數(shù)據(jù)傳輸速率:通常具有明顯的尖峰數(shù)據(jù)特征。QoS要求:不同場景間有較大差異,與應用需求有關。數(shù)據(jù)安全要求:不同場景間有較大差異,與應用需求有關。數(shù)據(jù)可靠傳遞要求:要求較高,因涉及到控制過程是否能夠正常實現(xiàn)。數(shù)據(jù)持續(xù)性:通常具有長時間的持續(xù)性。與人交互性:高,通常是

10、對人操作指令的具體反映。對連接性的需求:較強,需要維護網(wǎng)絡連接以便于進行數(shù)據(jù)的正確傳輸。終端移動性:兩極分化。部分終端有很強的移動性;部分終端則通常不移動。舉例:工業(yè)自動化等。3 M2M業(yè)務對現(xiàn)網(wǎng)架構的影響從對現(xiàn)網(wǎng)架構的影響來說,M2M業(yè)務可以分為兩類:A類是現(xiàn)有網(wǎng)絡不能滿足需要網(wǎng)絡優(yōu)化的業(yè)務,這類業(yè)務需要過載控制功能來避免網(wǎng)絡過載,以及針對客戶的業(yè)務需求提供差別化的服務;B類是對于現(xiàn)有網(wǎng)絡影響較小的業(yè)務,這類業(yè)務是對時效性要求不高的MTC業(yè)務,而且這些業(yè)務和現(xiàn)在的移動網(wǎng)絡業(yè)務有類似的需求。從整體來說,M2M業(yè)務中大部分是A類業(yè)務,以下分析的是A類業(yè)務對現(xiàn)網(wǎng)架構的影響3。M2M業(yè)務的多樣性、差

11、異化,網(wǎng)絡的多種接入方式,M2M終端的海量性、差異化,以及M2M業(yè)務表現(xiàn)出來的傳統(tǒng)電信業(yè)務所不具有的各種特點,都對現(xiàn)網(wǎng)架構和網(wǎng)元設備產(chǎn)生了很大影響,其直接后果是現(xiàn)網(wǎng)的核心網(wǎng)元如HLR/PCRF/GGSN的能力已經(jīng)不能滿足M2M業(yè)務所帶來的信令、流量沖擊和業(yè)務控制需求,主要體現(xiàn)在以下方面:(1)由于物聯(lián)網(wǎng)業(yè)務的特殊性,可能會產(chǎn)生瞬時大量的信令,會對無線網(wǎng)絡的關鍵信令控制設備(STP/HLR/PCRF)造成影響而導致全網(wǎng)的癱瘓。因此,一方面要大規(guī)模提高相關信令控制設備的容量或設備的信令處理能力;另一方面需要進行差異化、分優(yōu)先級的接入控制;此外,關鍵信令控制和處理設備要具備一定的設備過載保護機制以及

12、高容災、高流控能力,避免關鍵網(wǎng)元的過載,從而有效提升整網(wǎng)的可靠性。(2)由于物聯(lián)網(wǎng)業(yè)務的特殊性,其接入方式的多樣性,涉及行業(yè)及用戶和設備的多樣性、海量性,因此需要對用戶數(shù)據(jù)管理HLR網(wǎng)元進行相應增強,包括其數(shù)據(jù)庫的可擴展性和靈活性,除了標準的用戶簽約信息,還有設備序列號、設備驅(qū)動程序信息、位置信息和配額信息等運營商、M2M客戶私有字段等;對多種接入類型的支持,可對由不同接入類型(2G/3G/LTE)接入網(wǎng)絡的設備進行鑒權;對用戶標識和尋址的靈活動態(tài)支持,支持一卡多號或一號多卡;支持對終端設備基本狀態(tài)的查詢,能通過網(wǎng)絡側(cè)下發(fā)終端“蘇醒”請求,發(fā)現(xiàn)設備被盜時能夠立刻鎖死等。(3)由于物聯(lián)網(wǎng)業(yè)務的特

13、殊性及多樣性、群組性,因此有必要對業(yè)務進行區(qū)分,包括業(yè)務分類分級、QoS分級、用戶分組、設備分組,從而進行流量管理和業(yè)務管理,根據(jù)忙閑時、地理位置等各種特性采取不同的接入和傳輸處理策略等。此外,在現(xiàn)網(wǎng)PCC架構中疊加物聯(lián)網(wǎng)策略控制,因其特殊性,PCRF(Policy and Charging Rules Function,策略與計費規(guī)則功能)進行策略控制時需先判斷是個人用戶還是物聯(lián)網(wǎng)用戶,而且物聯(lián)網(wǎng)數(shù)據(jù)的瞬時爆發(fā)性會影響現(xiàn)網(wǎng)PCC架構所以有必要設置專用的物聯(lián)網(wǎng)M2M PCRF??傊?,需要對相關網(wǎng)元進行能力的增強和升級,可以改造現(xiàn)有相關網(wǎng)元,也可以設置M2M的專用網(wǎng)元疊加在現(xiàn)有H2H網(wǎng)絡上來解決

14、相應問題。4 國際標準組織提出的M2M網(wǎng)絡架構國際標準組織如ITU、ETSI和3GPP等分別從不同角度提出了M2M的網(wǎng)絡架構4。根據(jù)ITU-T發(fā)布的定義,物聯(lián)網(wǎng)體系架構主要可劃分為三個層面:感知層、網(wǎng)絡層和應用層。如圖1所示,該架構基本達成業(yè)界共識,但是其體系架構過于抽象屬于概念模型,在轉(zhuǎn)化為技術實現(xiàn)的過程中還需要細化。在ITU-T物聯(lián)網(wǎng)體系架構的基礎上,ETSI提出了一種可看作邏輯模型的M2M應用頂層架構5。如圖2所示,ETSI把M2M體系架構劃分為M2M設備及網(wǎng)關和M2M網(wǎng)絡兩個大域。M2M設備及網(wǎng)關域包括M2M設備、M2M網(wǎng)關和M2M局域網(wǎng),可以基于現(xiàn)有的各類標準實現(xiàn);M2M網(wǎng)絡域則包括

15、廣域網(wǎng)和M2M應用系統(tǒng)。相較于ITU的概念模型,ETSI的邏輯模型側(cè)重于M2M服務能力層,通過對服務能力和接口的定義來實現(xiàn)屏蔽網(wǎng)絡細節(jié)的M2M應用、M2M服務能力及網(wǎng)絡三者之間的相互調(diào)用,可供在研究平臺和網(wǎng)關設備功能及接口時參考。在ETSI的體系架構基礎上,3GPP也提出了一種支持MTC應用的通信架構。如圖3所示,涉及到的實體包括MTC終端、承載網(wǎng)絡、MTC服務器和MTC應用。其中,MTC服務器是MTC業(yè)務的管理平臺;MTC應用負責業(yè)務邏輯的實現(xiàn)。承載M2M通信的移動網(wǎng)絡包括GPRS、EPC以及短消息和IMS網(wǎng)絡。3GPP提出的MTC通信架構側(cè)重于M2M網(wǎng)絡層,對M2M網(wǎng)絡中各通信網(wǎng)元的功能和

16、接口進行了定義,其適用于研究MTC業(yè)務的管理平臺以及M2M核心網(wǎng)絡的功能和接口時參考。 以上標準組織雖然都提出了M2M的網(wǎng)絡體系架構,但是有其局限性。ITU和ETSI的架構過于框架性,對于實際的網(wǎng)絡部署沒有較好的指導意義;3GPP雖然對于網(wǎng)絡網(wǎng)元功能增強有一定的研究,但是由于目前部署的H2H網(wǎng)絡大多處于R7或R8版本,而MTC網(wǎng)絡體系的研究是在R10以上版本的網(wǎng)絡基礎上進行的。因此,在現(xiàn)有網(wǎng)絡中按照標準來部署MTC網(wǎng)絡還為時尚早,需要研究一種網(wǎng)絡架構既具有在現(xiàn)有網(wǎng)絡基礎上投資和部署的可行性,又能滿足現(xiàn)階段MTC業(yè)務應用的需求。5 3G網(wǎng)絡階段的M2M網(wǎng)絡架構在現(xiàn)有的3G網(wǎng)絡階段,為解決發(fā)展M2

17、M業(yè)務面臨的網(wǎng)絡運營和網(wǎng)絡資源問題,運營商可以通過采用物理上隔離的網(wǎng)絡來單獨承載機器通信業(yè)務,在初期可以通過核心網(wǎng)中專設的網(wǎng)元實現(xiàn)業(yè)務的隔離,在后期演進也可以延伸到采用專用的接入網(wǎng)實現(xiàn)物聯(lián)網(wǎng)業(yè)務的接入隔離。此外,物聯(lián)網(wǎng)管理平臺也是物聯(lián)網(wǎng)解決方案中必不可少的組成部分。物聯(lián)網(wǎng)管理平臺與物聯(lián)網(wǎng)獨立網(wǎng)元配合,在物聯(lián)網(wǎng)業(yè)務發(fā)展的初期階段主要實現(xiàn)物聯(lián)網(wǎng)獨立碼號集中管理和物聯(lián)網(wǎng)業(yè)務有效管控等功能。隨著物聯(lián)網(wǎng)的發(fā)展,平臺的功能也會逐步支撐更多資源管控與更多的業(yè)務流程,并開放更多資源及能力??梢愿鶕?jù)M2M業(yè)務的特性,實現(xiàn)基于位置、時間段、接入類型的QoS控制和相應的計費策略;還可以根據(jù)用戶的屬性及行為進行相應的

18、分組,實行基于群組的流量統(tǒng)計、事件分發(fā)和策略執(zhí)行等,這體現(xiàn)在核心網(wǎng)中PCRF/SPR/M2MSP的功能實現(xiàn)。綜上所述,在3G發(fā)展階段,M2M網(wǎng)絡架構的特征具體體現(xiàn)在以下四個方面:(1)在無線接入側(cè)對Wi-Fi、2G、3G、無線傳感網(wǎng)絡等多種方式的整合,實現(xiàn)移動通信網(wǎng)絡對行業(yè)應用領域的廣覆蓋,構建面向行業(yè)的M2M移動網(wǎng)絡。(2)在核心側(cè)構建M2M專用的HLR、GGSN、SMSC等網(wǎng)元,實現(xiàn)對M2M等物聯(lián)網(wǎng)業(yè)務的集中運維和管理,并能夠?qū)崿F(xiàn)與“現(xiàn)網(wǎng)”的有效隔離,有利于網(wǎng)絡的安全、穩(wěn)定、擴容及升級。(3)在核心網(wǎng)中部署M2M專用的PCRF等策略控制網(wǎng)元,利用M2M業(yè)務的業(yè)務特性和用戶屬性,實現(xiàn)對網(wǎng)絡資

19、源的高效利用和對業(yè)務服務的精細支撐。(4)在核心網(wǎng)中搭建M2M業(yè)務支撐平臺,實現(xiàn)對業(yè)務和終端的統(tǒng)一管理。在物聯(lián)網(wǎng)業(yè)務發(fā)展的初期階段,考慮針對物聯(lián)網(wǎng)網(wǎng)絡通信需求,進行最小成本隔離:只新建核心網(wǎng)的關鍵節(jié)點,實現(xiàn)網(wǎng)絡支撐隔離。對于業(yè)務系統(tǒng),需要單獨建設物聯(lián)網(wǎng)平臺,實現(xiàn)業(yè)務承載隔離;對于接入網(wǎng)絡,則公用,不考慮單獨建設。如圖4所示,是一種在現(xiàn)網(wǎng)上疊加專用M2M核心網(wǎng)絡的架構。在該方案中,與現(xiàn)網(wǎng)共用無線和SGSN,新建物聯(lián)網(wǎng)專用的GGSN/DPI,通過APN選路將物聯(lián)網(wǎng)數(shù)據(jù)路由到處理物聯(lián)網(wǎng)數(shù)據(jù)的GGSN,新建物聯(lián)網(wǎng)專用的PCRF+SPR,完成對物聯(lián)網(wǎng)業(yè)務的流量、安全、QoS控制,新建物聯(lián)網(wǎng)專用的HLR進

20、行物聯(lián)網(wǎng)設備簽約信息、標識及安全管理。3G階段的M2M網(wǎng)絡架構如圖5所示。其中,主要網(wǎng)元的功能如下:HLR:由于現(xiàn)網(wǎng)的HLR都是支持H2H的HLR,支持的能力和M2M的支持能力還是有所不同。HLR也有自己特殊的一些需求,包括:需要支持群組簽約數(shù)據(jù)能力;支持終端監(jiān)控(如位置監(jiān)控、IMEI監(jiān)控等)能力,支持某個時間段接入控制,支持擴展ID到MSISDN、IMSI的映射能力,支持終端特征簽約(如終端的低優(yōu)先級、是否為PS only等),供SGSN控制UE的行為;HLR要支持多profile的簽約,降低終端漫游時的資費,支持一卡多號和一號多卡的M2M業(yè)務。GGSN:擴展的GGSN需要增強支持基于群組流

21、量統(tǒng)計,基于流的計費信息、QoS策略執(zhí)行和基于群的事件上報等。短消息中心:除了現(xiàn)有的短消息的功能外,需要支持短消息完成設備觸發(fā)的功能,支持在一號多卡的M2M業(yè)務中短消息的群發(fā)功能。PCRF:支持群組的策略數(shù)據(jù)動態(tài)下發(fā)、更新和刪除,支持群組用戶的流量監(jiān)控。SCP:完成M2M業(yè)務中的緊急呼叫等語音呼叫的計費,產(chǎn)生語音呼叫話單。OCS:實時信用控制、預付費使用數(shù)據(jù)業(yè)務和增值業(yè)務實時計費。M2MSP業(yè)務平臺:M2M平臺為集團客戶提供統(tǒng)一的M2M終端管理、終端設備鑒權。提供數(shù)據(jù)路由、監(jiān)控、用戶鑒權等管理功能;承載信息上報、參數(shù)配置、終端狀態(tài)檢測、終端注冊等業(yè)務功能的短信上下行通道;支持一卡多號和一號多卡

22、的M2M業(yè)務,進行動態(tài)的號碼管理。在實際部署中,物聯(lián)網(wǎng)業(yè)務支撐管理平臺按照功能劃分為總部平臺、省平臺兩個層面。6 結語M2M業(yè)務的多樣性、差異化以及M2M業(yè)務表現(xiàn)出來的傳統(tǒng)電信業(yè)務所不具有的各種特點,都對現(xiàn)網(wǎng)架構和網(wǎng)元設備產(chǎn)生了很大影響。本文在研究M2M業(yè)務特征及其對現(xiàn)網(wǎng)的影響和國際標準組織提出的網(wǎng)絡體系架構的基礎上,提出了在現(xiàn)有移動通信網(wǎng)絡上部署具有可行性,又能一定程度上滿足MTC業(yè)務應用需求的網(wǎng)絡架構。運營商發(fā)展M2M業(yè)務的基礎與發(fā)展移動通信是一致的,在專用的M2M網(wǎng)絡架構中,必須長遠規(guī)劃網(wǎng)絡資源,根據(jù)業(yè)務發(fā)展實施網(wǎng)絡優(yōu)化和數(shù)據(jù)分流,加強平臺建設,完善網(wǎng)絡覆蓋,加大網(wǎng)絡容量,從根本上滿足M

23、2M業(yè)務需求,同時又不影響當前的人人通信業(yè)務,提高用戶體驗。參考文獻:1 沈嘉,劉思揚. 針對移動M2M業(yè)務的優(yōu)化技術研究J. 現(xiàn)代電信科技, 2011(10): 37-44.2 沈嘉,劉思揚. 面向M2M的移動通信系統(tǒng)優(yōu)化技術研究J. 電信網(wǎng)技術, 2011(9): 39-46.3 孫其博,劉杰,黎羴,等. 物聯(lián)網(wǎng):概念、架構與關鍵技術研究綜述J. 北京郵電大學學報, 2010(3): 1-9.4 諸瑾文,王藝. 從電信運營商角度看物聯(lián)網(wǎng)的總體架構和發(fā)展J. 電信科學, 2010(4): 1-5.5 沈蘇彬. 物聯(lián)網(wǎng)技術架構J. 中興通訊技術, 2011(1): 8-10.Abstract

24、article M2M business features and MTC communication network architecture are discussed. Detailed analysis of the M2M business and the impact of the current network architecture, and to draw ISO M2M network architecture, and on this basis in accordance with the present stage network status and the M2

25、M business requirements proposed network architecture for 3G network stage. Keywords dedicated network elements of the the M2M network architecture the PCRF core network 1 Introduction barter communication (as M2M, smart phone, PDA and Machine to Machine is a process involving one or more entities w

26、ith no human intervention, data communication, also known as machine type communication (MTC , Machine-Type Communication. With the rapid development of the M2M business, MTC based on mobile communication network is increasingly becoming a major mobile communication, but the traditional mobile commu

27、nication network, after all, is for everyone Communications (H2H, Hu-man to human business designed to adapt to the business needs of H2H, but can not meet the business needs of M2M. Specifically, at MTC and everyone different communication include the following 1: (1 MTC communication scene scene t

28、han H2H communication of rich and differences can be broadly grouped according to the division of features for location-aware and sharing environmental information perception, remote control and execution, data collection publishing, video surveillance, The near-field communication. differentiation

29、of these applications on the one hand the performance of functional diversity, on the other hand is also reflected in the application characteristics, and on the demand for network differentiation.(2 main data communication, including the small flow of packets, and video streaming.(3 requirements MT

30、C communication costs than H2H lower. M2M business after H2H business development, minimize cost is an important consideration of the M2M business survival. Different applications because of their different importance of different communication requirements communication, requires a combination of e

31、vents, the possibility and the need to pay costs to consider cost minimization.(4M2M huge number of terminals, the need for more flexible and have a strategy terminal management. Potential mass M2M terminal access communication network, and M2M terminals either from the transmission characteristics,

32、 QoS requirements, and the mobility of, or from the distribution density of the terminal, different H2H terminal.(5 mainly to the small amount of data transmission. If you continue to use the traditional mobile communication system to MTC communication, efficiency, cost and applicability of the syst

33、em are not optimal. Therefore, to consider the the M2M business features while reducing H2H business, in order to design MTC dedicated communication system is an important issue in the context of the current communication continuous development of material objects. 2 M2M business characteristics of

34、the design of the network architecture, network hosted business as the starting point 2 In other words, the the M2M network architecture design need to fully analyze the characteristics and needs of the M2M business, combined with the amount of the terminal upper and lower rows of data, frequency de

35、grees, QoS requirements and other aspects of the business characteristics, the application of the Internet of Things is divided into the following five categories. Among them, the analysis of the needs and characteristics of the various types of applications, including mobility, group communication,

36、 authentication, and periodic scheduled processing, large differences between different scenes. (1 monitor alarm class: the sensor local monitoring data, not match the expected data change occurs through the network to notify the application layer alarm.The average data transfer rate: low, only a sm

37、all amount of uplink data traffic sent certain trigger conditions. The peak data transfer rate: The big difference between the different scenes, the application needs to determine the transmission of data content. QoS requirements: there is a big difference between the different scenarios and applic

38、ation requirements, as well as the meaning of the current data represent.Data security requirements: the big difference between the different scenarios, and application requirements.Reliable data transfer requirements: large differences between the different scenarios, and application requirements.D

39、ata persistence: low, a short or shorter duration of data transmission is only exist in the event of a preset event. Interact with people: low, usually handled automatically by the system according to the preset approach. Connectivity needs: the need for monitoring to prevent the destruction of conn

40、ectivity or invalid.Terminal mobility: downstream traffic demand, mobility needs.Example: a blood transfusion car blood environment monitoring, manhole covers monitoring, mobile asset tracking. (Upstream traffic data collection class average data transfer rate: in a large amount of data, continuous

41、data reporting or periodic data reporting, downstream flow: low, is used to modify the escalation rules. The peak data transfer rate: The big difference between the different scenes, the application needs to determine the transmission of data content. QoS requirements: there is a big difference betw

42、een the different scenarios and application requirements, as well as the meaning of the current data represent.Data security requirements: the big difference between the different scenarios, and application requirements.Reliable data transfer requirements: large differences between the different sce

43、narios, and application requirements.Data persistence: depends on the data transmission interval and transmission choices. Paper mesh Interact with people: low, usually handled automatically by the system according to the preset approach. Connectivity needs: the need for monitoring to prevent the de

44、struction of connectivity or invalid.Terminal mobility: due occasionally downlink data, so it is necessary to optimize the mobility management.For example: monitoring of meteorological information, the scene of the fire data collection, the collection of traffic information. Upstream traffic (3 the

45、push class average data transfer rate: usually low, mainly used for filtering or input required to provide application conditions (such as location information, downlink traffic: usually larger, mainly for passing information (such as push advertising, video media, continued, based on the conditions

46、 of interaction outside or periodic data push.The peak data transfer rate: spike data characteristics, under match conditions trigger. QoS requirements: there is a big difference between the different scenarios and application requirements, as well as the meaning of the current data represent.Data s

47、ecurity requirements: the big difference between the different scenarios, and application requirements.Reliable data transfer requirements: large differences between the different scenarios, and application requirements.The data persistence: usually has a longer persistence.Interact with people: hig

48、h, usually user feedback, the system based on feedback push information to adjust.Connectivity needs: a strong need to maintain a network connection in order to carry out the correct transmission of data.Terminal mobility: polarization. Part of the terminal has a strong mobility and part of the term

49、inal is typically not mobile.Example: intelligent Museum. (4 video monitoring class the average data transfer rate of upstream traffic: H, mainly used for the delivery monitoring of multimedia data, downlink traffic: low, and is mainly used for transmission control and adjustment commands.The peak d

50、ata transfer rate: no significant peak data characteristics, data transmission usually maintain a relatively stable transmission rate. QoS requirements: the big difference between the different scenarios, and application requirements.Data security requirements: the big difference between the differe

51、nt scenarios, and application requirements. Reliable data transfer requirements: at different times have different requirements as in normal circumstances requires moderate, but you need high reliability of delivery in the event of certain pre-event. The data persistence: usually has a long persiste

52、nce.Interact with people: low, users occasionally would intervene in the process of video surveillance.Connectivity needs: a strong need to maintain a network connection in order to carry out the correct transmission of data.Terminal mobility: polarization. Part of the terminal has a strong mobility

53、 and part of the terminal is typically not mobile.Examples: home security video surveillance. (5 remote control actuator class average data transfer rate of upstream traffic: usually low, mainly required for application filtering or input conditions (such as preset events downstream traffic: Dependi

54、ng on the complexity of the control object and control command level.Peak data transfer rate: typically have a significant peak data characteristics. QoS requirements: the big difference between the different scenarios, and application requirements.Data security requirements: the big difference betw

55、een the different scenarios, and application requirements.Reliable data transfer requirements: demanding, whether involved in the control process normally achieve. The data persistence: usually has a long persistence.Interact with people: high, usually reflect the specific operating instructions.Con

56、nectivity needs: a strong need to maintain a network connection in order to carry out the correct transmission of data.Terminal mobility: polarization. Part of the terminal has a strong mobility and part of the terminal is typically not mobile.Example: industrial automation. 3 M2M business impact of

57、 the current network architecture from the existing network architecture, M2M business can be divided into two categories: A class is the existing network can not meet the need for network optimization business, this type of business need to avoid overload control function network overload, as well as to provide differentiated services for customers' business needs, class B is for ex

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
  • 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論